Sciweavers

5684 search results - page 1073 / 1137
» Computing with active dendrites
Sort
View
ACL
2010
15 years 1 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
DAC
2010
ACM
15 years 1 months ago
Tradeoff analysis and optimization of power delivery networks with on-chip voltage regulation
Integrating a large number of on-chip voltage regulators holds the promise of solving many power delivery challenges through strong local load regulation and facilitates systemlev...
Zhiyu Zeng, Xiaoji Ye, Zhuo Feng, Peng Li
HUC
2010
Springer
15 years 1 months ago
A holistic multipurpose life-log framework
Life-log systems have a wide range of usages from memory augmentation to health monitoring. Recent advances in pervasive devices and sensor networks enable us to create tools that...
Reza Rawassizadeh
ICSE
2010
IEEE-ACM
15 years 1 months ago
Synthesized essence: what game jams teach about prototyping of new software products
The development of video games comprises engineering teams within various disciplines, e.g., software engineering, game production, and creative arts. Game jams are a promising ap...
Juergen Musil, Angelika Schweda, Dietmar Winkler, ...
IPPS
2010
IEEE
15 years 1 months ago
Oversubscription on multicore processors
Abstract: Existing multicore systems already provide deep levels of thread parallelism. Hybrid programming models and composability of parallel libraries are very active areas of r...
Costin Iancu, Steven Hofmeyr, Filip Blagojevic, Yi...
« Prev « First page 1073 / 1137 Last » Next »